Toggle navigation
3583 BYTES... READY?
Home
New Posts
Old Posts
Why 3583?
Old Blog
Welcome to the old blogs. Here you can find stuff published on the old site.
2017
Malware Virtual Test Environment: Fail-secure network isolation and VPN routing
Gone in 60 seconds: your phone is the Achilles heel of your security!
2016
Tech explained: Hash puzzles and proofs of work
Scraping Data with Python and XPath
Tech Brief: Anonymising sensitive data with entropy and salt.
Tech explained: What is a hash, what is brute force and are hashes secure?
Security concerns and Census Statistical Linkage Keys explained
Security Brief: The Australian Census and Statistical Linkage Keys
Your broadband router is not as secure as you think it is
Is someone watching you online? The security risks of the Internet of Things
Analysis - Email list integrity, 96% of organisations handle my email address appropriately
What is ransomware and how to protect your precious files from it
John The Ripper 1.8.0 Jumbo - How to build on Mac OS 10.11 (El Capitan)
Ransomware Brief - Evolution and The Future
2015
Obligatory First Post